Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Non-repudiation with mandatory proof of receipt
ACM SIGCOMM Computer Communication Review
Proactive public key and signature systems
Proceedings of the 4th ACM conference on Computer and communications security
Journal of Network and Computer Applications
Password authentication with insecure communication
Communications of the ACM
Authentication of signatures using public key encryption
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
An Intranet Security Framework Based on Short-Lived Certificates
IEEE Internet Computing
Timely Authentication in Distributed Systems
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Freshness Assurance of Authentication Protocols
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Electronic Payments of Small Amounts
Proceedings of the International Workshop on Security Protocols
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Computer
A fair non-repudiation protocol
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
On the validity of digital signatures
ACM SIGCOMM Computer Communication Review
Maintaining the Validity of Digital Signatures in B2B Applications
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Information Systems Frontiers
A convertible group signature scheme
ACM SIGOPS Operating Systems Review
On timeliness of a fair non-repudiation protocol
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Employ a mobile agent for making a payment
Mobile Information Systems
A secure on-line software transaction scheme
Computer Standards & Interfaces
An intensive survey of fair non-repudiation protocols
Computer Communications
Hi-index | 0.24 |
Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable dispute resolution. To be eligible as non-repudiation evidence, the digital signature on an electronic document should remain valid until its expiry date which is specified by some non-repudiation policy. The conventional approaches are either inefficient or insecure to achieve non-repudiation in electronic commerce. This article presents a practical scheme to secure digital signatures as non-repudiation evidence with an adjustable degree of risk.